Internet of Things (IoT) devices are operating in various domains like healthcare environment, smart cities, smart homes, transportation, and smart grid system. These devices transmit a bulk of data through various sensors, actuators, transceivers, or other wearable devices. Data in the IoT environment is susceptible to many threats, attacks, and risks. Therefore, a robust security mechanism is indispensable to cope with attacks, vulnerabilities, security, and privacy challenges related to IoT. In this research, a systematic literature review has been conducted to analyze the security of IoT devices and to provide the countermeasures in response to security problems and challenges by using mobile computing. A comprehensive and in-depth security analysis of IoT devices has been made in light of mobile computing, which is a novel approach. Mobile computing's technological infrastructures such as smartphones, services, policies, strategies, and applications are employed to tackle and mitigate these potential security threats. In this paper, the security challenges and problems of IoT devices are identified by a systematic literature review. Then, mobile computing has been used to address these challenges by providing potential security measures and solutions. Hardware and software-based solutions furnished by mobile computing towards the IoT security challenges have been elaborated. To the best of our knowledge, this is the first attempt to analyze the security issues and challenges of IoT in light of mobile computing and it will open a gateway towards future research. INDEX TERMS Internet of Things devices, Security, Mobile Computing, Mobile applications, Smartphone. I. Research Questions Keywords What are the security problems and challenges faced by IoT devices in the network? Inclusion Criteria Research papers published in English language were included Primary studies i.e. original research papers were selected Research papers, book chapters or magazines relevant to our main topic were selected Research papers ranges in years from 2011 to 2019 were included for the studies Exclusion Criteria Papers written other than English language are not included Papers did not answer research questions or did not define the topic properly were excluded Gray papers were excluded Elimination of duplicated papers Research papers with less than three pages were removed
Background The emerging trends in recent years are "Big Data" and "Big Data Analytics" which have become popular globally. They facilitate the analysis of the entire data in real time by developing and using machine-to-machine algorithms for predictive modelling and to arrive at decisions based on such models [1]. According to McKinsey [2] "Big Data" is considered as the datasets that challenge the ability of typical applications and technologies in managing and analysing the data. Big data also challenges the human imagination. For example, while some might consider a few dozen terabytes as big data, in reality it is not. Surely, it is a large dataset but can still be managed and stored in a local network attached storage (NAS) or storage area network (SAN) using array of disks. By and large, it can be perceived that big data is petabytes in size requiring a complex distributed
Application maintenance consumes a considerable amount of an organization's time and resources each year. Almost 60% of IT budget is spent alone on application maintenance. The reason of offshore outsourcing of application maintenance is not only the reduction of maintenance cost but to free up the resources and to keep the focus on core products. Offshore outsourcing is a common business strategy that is used by companies to achieve cost savings about 20-50%. However, the decision making process of application maintenance is a complex phenomenon. It is based on a set of influencing factors, clients' requirements and nature of the project. Hence, the current study is aimed at the in-depth investigation of the complex sourcing decision process of application maintenance. Accordingly, a systematic literature review is performed to determine the influencing factors and critical success factors that will be used by the decision makers for the evaluation of projects before making the outsourcing decisions. A total of 15 influencing factors out of 52 selected papers were identified. Based on the defined criteria, amongst the identified factors, only 10 factors were ranked as critical success factors, which are employees' skills, cost, legal requirements, infrastructure, communication, knowledge transfer, maturity level, project management, language barrier and frequent requirements changes. Consequently, a sourcing model was proposed based on the identified critical success factors that help the IT managers and domain experts in making appropriate outsourcing decisions. INDEX TERMS Application maintenance, critical success factors, influencing factors, offshoring, outsourcing, outsourcing decisions.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.